SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

In this session, Microsoft's Digital Crimes Unit (DCU) will dive into the recent disruption of RaccoonO365, the fastest-growing phishing-as-a-service (PhaaS) platform that sold phishing kits targeting Microsoft Office 365 users that empowered cybercriminals across 94 countries to steal thousands of Microsoft 365 credentials.
Developing intelligence requirements is a recurring challenge often highlighted by the CTI community. Despite numerous great write-ups, discussions, and presentations on extracting and converting stakeholder needs into intelligence requirements, there is still plenty of room to explore practical ways of using requirements to evaluate and improve CTI lifecycles continuously.
Just when we thought we had seen every possible command and control technique, sophisticated adversaries continue to develop new methods to remain stealthy in compromised environments. These evolving techniques are actively reshaping the threat landscape.
The value of Priority Intelligence Requirements (PIRs) is well-known in CTI, yet many teams, including ours, struggle to translate these high-level concepts into tangible, day-to-day actions of Security Operations, and Cyber Defense activities.
North Korean state-sponsored threat actors behind the “Contagious Interview” operation blend social engineering with malicious open source packages to compromise developers and tech job seekers. Throughout 2025, we identified and analyzed hundreds of malicious npm packages (thousands of downloads) delivering stealthy, multi-stage loaders and infostealers that fetch the BeaverTail malware and the InvisibleFerret backdoor.
In a world where names make headlines, everyone wants to know “who did it?” But for most teams, perfect attribution is expensive, and practical attribution is actionable. We’ll break down attribution into three functional tiers from tactical to operational to strategic - and show how to align your effort to your program’s maturity, deadlines, and data quality.
The way we consume and interact with information constantly evolves. For intelligence analysts, the challenge is not just collecting and analyzing data, it’s how we transform that complexity into clarity for ourselves, our teams, and our stakeholders.
Across organizations, intelligence teams grapple with the following challenges: aligning the threat intelligence program with organization's business priorities, and articulating its tangible business value. How does a threat intelligence program ensure that insights on the current and emerging threat landscape reach the right stakeholders and ultimately safeguard business continuity and resiliency.
As ransomware campaigns increasingly target third- and fourth-party vendors, organizations must rethink their threat intelligence and response strategies beyond the traditional perimeter. In this talk, I’ll share how I identified a critical gap in ransomware preparedness while working in the financial sector and built a scalable response program to address third-party risk.
In mid-2025, Colombian users became the target of a coordinated campaign known as Shadow Vector, which combined local social engineering with privilege escalation exploits and court-themed SVG lure documents. Multiple vendors reported on the operation, attributing it to activity consistent with the "Blind Eagle" (APT C 36) threat group. While technically straightforward, the campaign shows how regional actors can merge simple malware with culturally resonant lures and creative delivery methods to achieve their goals.
Presently, many decision-makers view cyber forecasting as little more than creative brainstorming. Useful for discussion, not for decisions. As a result, they rarely ask CTI teams for forecasts, and when they do, they often don’t rely on them.
This talk will debrief on an operation against the Rhadamanthys infostealer in the months following its initial release. Though this operation, we were able to obtain a copies of data stolen by attackers across all publicly identifiable control servers, using a combination of broad Internet scanning and a previously unreleased exploit. While technically successful, Rhadamanthys continues to be used today and has become increasingly resilient to disruption.
Virtual
When most people think of malware analysis, what typically comes to mind are complex disassemblers and a maze of indecipherable assembly code. However, there are some great community tools that can provide actionable insights without reverse engineering.
Software supply chain attacks are surging to unprecedented levels. In 2025, such attacks doubled compared to the previous year, now accounting for roughly 30% of all breaches. Threat actors are exploiting trusted vendor relationships as an entry point–effectively poisoning the well upstream to compromise countless downstream customers.
Virtual